The Internet and Network Technologies



Similar documents
3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

Networks and the Internet A Primer for Prosecutors and Investigators

NETWORKS AND THE INTERNET

USES OF INTERNET TECHNOLOGIES IN CHILD SEXUAL ABUSE CASES. Peer to Peer Networking TYPES OF TECHNOLOGY. Presentation Supplement. How can it be used?

CHAPTER 9: THE EVOLVING INTERNET

Using MIS 3e Chapter 6A Appendix

Technology/Internet Usage Workshop

The Internet, Intranets, and Extranets. What is the Internet. What is the Internet cont d.

Chapter 5. Data Communication And Internet Technology

Introduction to the Internet

Kick starting science...

CITS1231 Web Technologies. Client, Server, the Internet, and the Web

Chapter 9. The Internet: Information Technology Infrastructure for the Digital Firm. Essentials of Management Information Systems

What should I do if I have problems with my account statement?

Mobile Device Manual for 3G DVRs

Masters of Science in Information Technology

Chapter 7. The Internet and World Wide Web. What You Will Learn... Computers Are Your Future. The Internet. What You Will Learn...

Internet Basics. Basic Terms and Concepts. Connecting to the Internet

Chapter 15: Advanced Networks

Discovering Computers Chapter 9 Communications and Networks

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

Protocols. Packets. What's in an IP packet

How to Search the Internet

Chapter 9 The Internet

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

How To Design The Web And The Internet

Network Setup Guide. 1 Glossary. 2 Operation. 1.1 Static IP. 1.2 Point-to-Point Protocol over Ethernet (PPPoE)

Introduction to Computer Networks and Data Communications

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

MMGD0204 Web Application Technologies. Chapter 1 Introduction to Internet

Alexander Nikov. 6. Telecommunications and networks, the Internet. Hyundai Heavy Industries Creates A Wireless Shipyard. a Wireless Shipyard

Telecommunications, the Internet, and Wireless Technology

Lab Configuring Access Policies and DMZ Settings

NETWORKING TECHNOLOGIES

CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION

SHIDLER TELEPHONE INTERNET BROADBAND INTERNET SERVICE DISCLOSURES. Updated November 20, 2011

High-Speed Broadband Internet Guide

TP-LINK TD-W8901G. Wireless Modem Router. Advanced Troubleshooting Guide

Introduction. Network Basics. Workstations. Server. Hub

General Questions about TC3Net Residential DSL:

Internet Jargon. Address: See Uniform Resource Locator.

Load Balance Mechanism

POTTAWATOMIE TELEPHONE COMPANY BROADBAND INTERNET SERVICE DISCLOSURES. Updated November 19, 2011

Internet Infrastructure

Facebook Smart Card FB _1800

Quick Installation Guide

Access the GV-IP Camera through a broadband modem

3.1 RS-232/422/485 Pinout:PORT1-4(RJ-45) RJ-45 RS-232 RS-422 RS-485 PIN1 TXD PIN2 RXD PIN3 GND PIN4 PIN5 T PIN6 T PIN7 R+ PIN8 R-

Chapter 3 Restricting Access From Your Network

CA106 Web Design. Dr. Dónal Fitzpatrick, School of Computing Room l2.48, Extension 8929,

Web Browsers And Mailing Tools

Updated: April Copyright DBA Software Inc. All rights reserved. 2 Getting Started Guide

OPS Data Quick Start Guide

Key Term Quiz Answers

User s Manual TCP/IP TO RS-232/422/485 CONVERTER. 1.1 Introduction. 1.2 Main features. Dynamic DNS

Broadband Phone Gateway BPG510 Technical Users Guide

Internet tools and techniques at this level will be defined as advanced because:

UIP1868P User Interface Guide

IC3 Internet and Computing Core Certification Guide

APPLICATION NOTE. CC5MPX Digital Camera and IPn3Gb Cellular Modem 10/14. App. Note Code: 3T-Z

Internet and Intranet Calling with Polycom PVX 8.0.1

Chapter 1 Instructor Version

Webcam Viewing Live Over the Internet Using A Dynamic IP Internet Service

This section will focus on basic operation of the interface including pan/tilt, video, audio, etc.

ADOBE FLASH PLAYER Local Settings Manager

Connecting to the Internet

Chapter 2 - Microsoft Internet Explorer 6

CCNA Discovery Chapter Four

You will find the following information contained in this document: Requirements for performing a Self-Install of your Internet service

ResNet Guide. Information & Learning Services. Here to support your study and research

Chapter 9 Communications and Networks

Page 1 Basic Computer Skills Series: The Internet and the World Wide Web GOALS

CSCI Topics: Internet Programming Fall 2008

OUTDOOR IR NETWORK CAMERA Series

Troubleshooting Remote Viewing on the. Combo DVR/Monitor System

Web Technologies for Beginners NME Programme - Notes. Part 1 Introduction to Internet

NETWORK SETUP INSTRUCTIONS

What really is a Service?

NETWORK SETUP GLOSSARY

Chapter 4 Restricting Access From Your Network

Installation Guide. shipping label. your activation information DN006669

Linksys Gateway SPA2100-SU Manual

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Oct 15, Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

Networking. General networking. Networking overview. Common home network configurations. Wired network example. Wireless network examples

LAKE REGION ELECTRIC COOPERATIVE, INC. BROADBAND INTERNET SERVICE DISCLOSURES. Updated September, 2013

Technical Glossary from Frontier

Fundamentals of the Internet 2009/ Explain meaning the following networking terminologies:

Multi-Homing Dual WAN Firewall Router

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Step-by-Step Configuration

Introduction to computer networks and Cloud Computing

Introduction to Web Technology. Content of the course. What is the Internet? Diana Inkpen

Living Online. Module C

Setting up a broadband Internet connection

Wireless G Broadband quick install

Computer Networks and Internet working

THE. solution. STORe it. SHARE it.

Transcription:

The Internet and Network Technologies Don Mason Associate Director Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer owner actually has possession of Computer s hard drive and other memory Documents Pictures Outlook Emails Internet Cache CD s and floppy disks ipods Cell Phones External Hard Drives Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved 1

Inside the Box What the computer owner actually has possession of Outside the Box What is not stored on the owner s computer Online Email Accounts (Gmail and Yahoo) Internet Shopping Accounts Social Networking Accounts Backups of text messages Cell Site Location Data Using Pen/Trap for Internet DRAS information Subscriber account records Contents of Websites Outside the Box What is not stored on the owner s computer Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved 2

Networks Network Setup Networks may take two basic forms: Wired each computer connects to a router with a cable Speeds of 100 Mbps Wireless computers connect through a signal that is broadcasted by a router Home wireless networks allow sharing of a connection as far as 750 feet Unauthorized access is much easier Speeds up to 54 Mbps Basic Network Router Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved 3

Basic Network Router Server What is the Internet? A network of computers? A network of networks? It is a network of millions of networks World Wide Web Plus lots more. WWW is the most obvious part of the Internet, but it isn t all of it Each computer on the Internet uses TCP/IP to communicate The Internet World Wide Web (the Web) E-mail Instant messaging (IM) Webcam / Internet Telephone (VoIP) Peer-to-peer (P2P) networks Legacy Systems Usenet Newsgroups Telnet and File transfer (FTP) sites Internet Relay Chat (IRC) Bulletin boards Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved 4

What Kinds of Computers Can Be on the Internet? Mainframes Laptops Vehicles Cell Phones Personal computers Internet Connectivity Home PCs Internet Service Provider (ISP) Telephone dialin line Network Cable modem connection High-speed data link DSL line Network Network Internet Connections At one time, dial-up was the predominant way to connect to the Internet. Today, dialup has been replaced so the user is constantly connected and receives higher speeds Dial-up 56 Kbps DSL 245 Kbps to 20 Mbps T-3 44 Mbps 3G 200 Kbps; 4G 6.4 Mbps Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved 5

Internet Connections Many businesses utilize the same connection types as home users, but often subscribe to a higher connection speed Larger businesses use a T1 or T3 connection Requires direct fiber optic connection May cost more than $10,000 per month Even faster networks are available Cost can exceed $5 million per month IP Addressing Each device on the Internet has a unique IP address, such as this one: 317.23.90.134 Computers, servers, and even printers have an IP address Addresses are usually temporary In some cases, static addresses are assigned permanently IP Addressing If a network utilizes a router, there are two IP addresses involved Internal: each computer has an internal IP address that distinguishes the computers on the network External: the unique IP address assigned to the router by the ISP Data is received at the external IP address by the router, and then the router sends the information to the correct internallyaddressed computer Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved 6

IP Addressing Router Internal: 172.168.1.4 External: 190.56.892.002 Computer 1 Internal: 172.168.1.1 External: 190.56.892.002 Computer 3 Internal: 172.168.1.3 External: 190.56.892.002 Computer 2 Internal: 172.168.1.2 External: 190.56.892.002 Coffee Shop Internal: 172.168.1.102 External: 235.71.90.123 The Office Internal: 172.168.1.195 External: 190.56.892.002 Home External: 753.23.234.901 Why Addressing Matters The Internet is a packet-switched network The component parts of a communication (i.e., the packets) sent to another host may travel by different paths Each packet makes one or more hops along the network on the way to its destination Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved 7

TCP Packet Switching A B Sending File from Computer A to Computer B TCP Packet Switching A B File is broken into smaller pieces called packets TCP Packet Switching A B The packets are labeled with addressing information Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved 8

TCP Packet Switching A B The packets are not sent through the same path. There are billions of paths they may take. TCP Packet Switching A B When the packets arrive, they must be put back together. The Path 1 2 3 Home Computer Home Router 5 4 Internet Service Provider Website Host Internet Exchange Point Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved 9

Domains & URLs Domain names are used to help a browser locate a website. For example: http :// www.ncjrl.org Protocol Subdomain Domain Host Top- Level Domains & URLs Domain names provide information about the corresponding computer.com,.gov,.edu,.net,.mil are generic top-level domains for types of organizations.xxx added in 2011 New TLDs like.hotel expected in the near future other top-level domains are geographybased (e.g.,.de for Germany,.fr for France, etc.) Domains & URLs Domain names often serve as an alias for an IP address. For some websites, the IP address is interchangeable with the domain name. For example, you can visit Google by entering either: http://www.google.com http://74.125.159.99/ Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved 10

Why It Matters How Computers, Networks, and the Internet Work Immense amount of digital data created, transmitted, stored Some created by humans A lot necessarily created by machines in the background Digital Evidence User-created Text (documents, e-mail, chats, IM s) Address books Bookmarks Databases Images (photos, drawings, diagrams) Video and sound files Web pages Service provider account subscriber records Digital Evidence Computer/Network-created Email headers Metadata Activity logs Browser cache, history, cookies Backup and registry files Configuration files Printer spool files Swap files and other transient data Surveillance tapes, recordings Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved 11

Web Browsers A browser is a computer application that retrieves and displays content from the web This content may include web pages, videos, pictures, and more Popular browsers include Firefox, Internet Explorer, Chrome, and Safari Browser Functions Web browsers also collect a variety of information about a user s online actions and save this information on the computer History Cache / Temporary Internet Files Cookies Browser Functions History Records each page visited within the browser Tags each visit with a time and date Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved 12

Browser Functions Internet History Browser Functions Cache (Temporary Internet Files) Stores data so that future requests for the same website can be served faster Cache is most obvious when you click the back button. The webpage appears almost immediately because the content is retrieved from your computer, not the server Cache may remain on a computer for weeks at a time or longer Browser Functions Cache (continued) Usually consists only of images and text May allow viewing of an entire website even if the computer is not connected to the Internet Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved 13

Browser Functions Temporary Internet Files Folder Browser Functions Cookies Text stored by the browser May store a user s site viewing preferences or contents of their shopping cart Some will contain personal information such as a login name or email address Cookies rarely, if ever, contain information like passwords or credit card numbers Browser Functions Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved 14

The Internet: It s more than just email Web 2.0 Interactive Internet communities Social networks Blogs Wikis Video or photo sharing sites Online role-playing games Virtual worlds Virtual Worlds features: User chooses name, job, body type, lifestyle, personality Exchange of USD for Second Life currency Money is used to buy clothing, cars, and buildings, and to pay for services Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved 15

Avatars in Second Life Virtual Worlds Ever wanted to fly? Online Lectures Virtual Worlds Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved 16

Virtual Worlds Political Rallies Virtual Worlds Social Networking Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved 17

Social Networking Social Networking Some Social Networking features: Posting Messages (public or private) Personal Profile Picture Sharing Interactive Games Instant Messaging Classified Advertising Social Networking Search Search Results One Result: Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved 18

Social Networking Consider Cloud Computing ( Web 3.0?) Cloud Computing Basically, obtaining computing resources from someplace outside your own four walls Processing Storage Messaging Databases etc. Entrusting data to third-party providers Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved 19

The Cloud Everything we currently do. Email Online Storage Social Networking Peer-Peer File Sharing Chat and IM Virtual worlds and online games What Is a Web App? A program similar to those on your computer, but different because it does not need to be installed Accessed entirely online No need to update Less chance of getting viruses and spyware from installing them Works on any computer with a browser Macs, PCs, cell phones Peer-to-Peer Networking Peer-to-Peer Networking is used to download files from the Internet including: Music Movies Books & Magazines Documents Pornography While not always illegal, it often is. Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved 20

Client-Server vs. Peer-to-Peer Peer-to-Peer Networking Step 1: User downloads the software Peer-to-Peer Networking Step 2: User searches for the movie and downloads a torrent file Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved 21

Peer-to-Peer Networking Step 3: User begins to download the file Jim s Download Queue Different users that are sharing the file with Jim Peer-to-Peer Networking Step 4: User is able to play the movie and his computer often continues to share it with other users on BitTorrent Peer-to-Peer Networking Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved 22

Considerations By default, BitTorrent and other P2P programs share downloaded files Broadband use turned home computers into distributed super-networks for sharing files Design of networks fault tolerant and load balancing Considerations Users on Internet voluntarily Users can decide, through settings in the software, how much or how little of their computers will be open to viewing by others on the Internet Considerations Every download is exact duplicate of the original image Internet Protocol (IP) Address of individual user can be ascertained (identifying unique computer) Successful tracking of IP address reveals computer that had the file available for distribution Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved 23

Cellular Phones Cellular Phones Modern cell phones have a variety of functions, including: SMS (short message service) MMS (multimedia message service) Phone Calls Cameras File Storage Internet Access Cellular Phones SMS (short message service) 160 characters or less Sent from cell phone to cell phone by way of towers and servers If recipient phone is off, a message will be saved until the phone is turned on Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved 24

Cellular Phones Sender types message and sends it The message travels through the nearest cell towers The phone company directs the message to the recipient through it s servers The message travels through the nearest cell towers to the recipient The recipient receives the message Cellular Phones Sample Tower/Sector Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved 25

Questions? Don Mason Associate Director National Center for Justice and the Rule of Law 662-915-6898 drmason@olemiss.edu www.ncjrl.org Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved 26